White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Two-thirds of couples ‘share passwords to online accounts’, Pew research finds

Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.

Critical IE and other flaws discovered. Patch your systems now, says Microsoft

If your system administrator looks a little frazzled this week, be nice to him or her and don’t grumble too much about the photocopier being jammed. It may be that they have more serious issues on their mind.

Personal email and cloud storage pose ‘biggest threat’ to corporate data, report claims

Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.

Worldwide cost of identity theft could be $5 billion per year, Microsoft survey finds

A Microsoft survey of 10,000 consumers found that the worldwide annual cost of identity theft and phishing could be as high as $5 billion – and the cost of repairing damage to people’s reputation online could be even higher.

Half of children left exposed to online threats as parents fail to use built-in controls

Less than half of parents use parental controls on internet-enabled devices bought for their children – leaving millions of youngsters potentially exposed to online threats, according to new research.

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family

A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.

Two-factor authentication: What is it – and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ’2FA’.

Microsoft boosts security for Office 365 users with two-factor logins

Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication being rolled out to versions of Office 365 this week.

Phishy business: Surge in tax scams as emails rise by nearly 50% in one year

Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy Age. Customers reported 23,347 phishing emails to the British tax authorities in the three months before the deadline.

American law firm admits entire server of legal files fell victim to Cryptolocker

A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to the Cryptolocker ransomware, according to a report by local station WSO CTV.

Facebook’s ‘A Look Back’ video used as bait for malware, report claims

A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed instead to another website, where they are prompted to download files.

Wangiri Telephone Fraud – One Ring to Scam Them All

Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more than you think.

Parental Controls and Technology

ESET security researchers Cameron Camp and Lysa Myers discuss parental controls and child surveillance options for parents looking to protect kids using digital devices.

U.S. hotel firm ‘knew of credit card breach for two weeks’ before going public

Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have known of a major credit card data breach for two weeks before details were made public.

Sniffing body odor has ‘enormous potential’ for biometrics, researchers claim

Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that are unaffected by bodily changes – or deodorant – according to Spanish researchers.

Flipboard: the smarter way to enjoy We Live Security on smartphones

Hand-picked stories from We Live Security are now available free on Flipboard, a magazine-style app for iOS, Android and Kindle.

Flipboard: A new way to enjoy We Live Security on the move

We Live Security has launched on Flipboard – the hit magazine-style app for Kindle, Android and iOS. Every week, we’ll hand-pick the best articles from We Live Security, and the app will automatically keep you up to date with our latest news, features and research.

Cellphone-sized $20 gadget can remote-control car electronics, researchers claim

A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and brakes to switching off headlights is to be shown off at the Black Hat Asia security conference in Singapore next month.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Graham Cluley

Aryeh Goretsky

Robert Lipovsky

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.